SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Gartner
           Security & Risk
           Management
           Summit 2011
           June 20 – 23
           National Harbor, MD (Washington, D.C. area)
           gartner.com/us/securityrisk


           Security and Risk Intelligence: The Next
           Step in Improved Business Performance


           Intelligence	for	today’s	business-critical	
           security	function:
           •	 Mobile	applications	and	security
           •	 Advanced	persistent	threats
           •	 Cloud	computing	and	security
           •	 Consumerization
           •	 Securing	the	virtualized	data	center


Early-bird savings Save	$300	when	you	register	by	April	29
Overview

 Who should                         Prepare to benefit from new
 attend                             security intelligence capabilities
                                    The Gartner Security & Risk Management Summit
 • CIO, CSO, CISO, CRO, CFO,
   CCO, CGO, CPO                    is the premier gathering for senior IT and business
   and CTOs                         executives across the breadth of IT security and risk
 • IT vice presidents/directors     management, including privacy, compliance, business
                                    continuity management, IT disaster recovery and
 • Governance, risk, compliance,
   and privacy executives
                                    business resiliency.

 • Senior business executives       Four complete programs—IT Security, Risk
                                    Management, Business Continuity Management and
 • General counsel
                                    CISO—deliver:
 • Finance, audit, legal risk and
   compliance and regulators        • More than 100 drill-down sessions across four
 • Enterprise and operational         programs and eight virtual tracks.
   risk managers                    • 15 analyst-led roundtable discussions, 8 workshops,
 • Continuity of operations           keynotes, case studies and more.
 • Crisis management                • Analyst one-on-one meetings.
 • Disaster recovery                • CISO Invitational Program.
 • IT infrastructure, network
                                    • NEW! CRO Invitational Program.
   and operation
                                    This year’s theme explores new business intelligence
 Hot                                being generated by next-generation security
 topics                             programs—a new source of business value tied
                                    directly to the security function. Join us to identify
 • Mobile applications              your next steps toward a more secure and resilient
   and security
                                    enterprise, and improved business performance.
 • Social media and security
 • Consumerization
 • Advanced persistent threats
 • The future of national
   cybersecurity
 • Cloud computing
   and security
 • Securing the virtualized
   data center
 • Critical infrastructure
   protection
 • Fraud detection
 • Endpoint security
 • Data loss prevention
 • Identity management
 • Information security metrics

22    Register by April 29 and save $300.
Benefits of Attending

Leverage the global expertise                           Earn
of Gartner analysts                                     CPE credits
The Gartner Security and Risk Management
                                                        Attending the summit helps
Summit is unique in the industry. No other gathering    you advance your continuing
brings together leading executives in IT security and   professional education.
risk management, Gartner analysts, and relevant         Registered participants are
solution providers for a comprehensive update on        eligible to earn CPE credits
security, risk and BCM disciplines. Get the insight     toward ISC2, ISACA, and
you need to:                                            DRII Certification programs.
                                                        Learn more at
• Architect an overall security, risk management and    gartner.com/us/securityrisk.
  BCM strategy aligned to business needs and goals.
• Protect mission-critical infrastructure from
  sophisticated new threats and deliver a more agile
  and resilient enterprise.
• Benefit from new business intelligence being
  generated by risk, security and BCM programs.
• Evaluate new security risks presented by SaaS,
  cloud computing and virtualization.
• Understand the changing vendor universe and
  make the right investments.
• Keep the board and other business leaders
  informed by articulating security and risk strategy
  in business language.
• Use insights from BCM, risk and security
  programs for greater efficiency and improved
  business performance.
• Prepare for new regulatory, compliance, privacy       Table of
  and e-discovery requirements.                         contents
• Use the latest BCM models to identify critical         2   Overview
  data and processes and make your enterprise
                                                         3   Benefits of Attending
  highly resilient.
                                                         4   Keynote Sessions
• Create a more risk-aware organizational culture
                                                         6   Meet the Analysts
  that supports risk management initiatives.
                                                         8   Summit Highlights
                                                         9   Program Descriptions
                                                        10   Virtual Tracks
                                                        12   Agenda at a Glance
                                                        14   Solution Showcase
                                                        15   Registration


                Visit gartner.com/us/securityrisk or call 1 866 405 2511. 3            3
Keynote Sessions

                 Gartner keynote
                 Presenter: Vic Wheatman, Managing Vice President,
                 Gartner Research
                 Today’s information security and risk management programs
                 are often based on a noncohesive set of technologies that
                 lacks comprehensive knowledge management, analytics and
                 planning capabilities. What is needed is a transformation to
                 enterprise security intelligence (ESI), enabling correlation and
                 impact analysis across all sources. We have learned how
                 to collect information, but we have not excelled at applying
                 knowledge. In this brief introduction, we will preview the ways
                 in which the conference will bring together the pieces of
                 information security and risk toward an ESI concept to improve
                 organizational performance.


                 Just announced! Guest keynotes
                 Presenter: Valerie Plame, “Outed” CIA operations officer
                 and best-selling author of “Fair Game”
                 As a covert CIA operations officer, Valerie Plame worked to
                 protect America’s national security and prevent the proliferation
                 of weapons of mass destruction. In 2003, she found herself at
                 the heart of a political firestorm when senior White House and
                 State Department officials revealed her secret status to several
                 national journalists—including a syndicated conservative
                 newspaper columnist who published her name. Plame’s
                 autobiography, “Fair Game: My Life as a Spy, My Betrayal by
                 the White House,” became a New York Times bestseller and
                 was recently made into a major motion picture.

                 Presenter: Joseph Wilson, Former U.S. ambassador,
                 author of “The Politics of Truth”; chairman of the board,
                 Symbion Power, Africa
                 Joseph Wilson’s historic career in international relations
                 spans more than three decades, with service under five U.S.
                 presidents: Ford, Carter, Reagan, Bush Sr. and Clinton. Widely
                 recognized for his diplomatic leadership, Wilson was hailed as
                 “a true American hero” by President George H. W. Bush for
                 his efforts to free more than 100 American hostages in Iraq.
                 The last American official to confront Saddam Hussein before
                 the start of the Gulf War, Wilson served as the acting U.S.
                 ambassador in Iraq throughout Operation Desert Shield.



4   Register by April 29 and save $300.
Presenter: David Pogue, Tech
                                                                 Program Chairs
                    Columnist, The New York Times
                     As the tech columnist for The New York
                     Times, David Pogue has a front-row
                     seat for observing today’s blazing-fast
                     torrent of new inventions. Hundreds of      Vic Wheatman
technologies come down the pike every year—and plenty            Conference Chair,
                                                                 Managing Vice President
get lots of press—but sadly, much of it is junk and some of
it carries potential security risks. Pogue will stick his neck
out to predict which will actually cause major, disruptive
changes. He’ll display, discuss and even demonstrate the
technological advances—in personal entertainment, mobile
technology, Web 2.0, security and more—that will have the        F. Christian Byrnes
most impact on society in the coming years.                      CISO, Managing
                                                                 Vice President



                    Security, Risk and Crisis Management
                    in the Coming Decade
                    Presenter: Michael Chertoff, Former
                    Secretary of Homeland Security,
                                                                 Ray Wagner
                    2005-2009, Co-Founder and Managing           IT Security, Managing
                    Principal, The Chertoff Group                Vice President

A senior official involved in managing major crises, Michael
Chertoff will explore strategies for managing risk. Drawing
upon the his experiences as head of the criminal division of
the U.S. Department of Justice and as U.S. Secretary of
Homeland Security, Mr. Chertoff’s experience spans
                                                                 Lawrence Orans
managing responses from the 9/11 attacks, the Enron and          IT Security, Director
other corporate accounting scandals and natural disasters,
including Hurricane Katrina.
Mr. Chertoff will address the security challenges posed by
foreign investment in sensitive domestic industries and will
close with a focus on global vulnerabilities, including supply
                                                                 French Caldwell
chain disruption and cyberwarfare. Mr. Chertoff will also        Risk Management
describe lessons learned regarding preparedness as well          and Compliance,
                                                                 Vice President
as resiliency and response in exceptionally high-profile
media environments.




                                                                 Roberta J. Witty
                                                                 Business Continuity
                                                                 Management,
                                                                 Vice President


                 Visit gartner.com/us/securityrisk or call 1 866 405 2511.                 5
Meet the Analysts

    CISO                                                               IT Security




    John Bace            F. Christian Byrnes French Caldwell           Ant Allan               Dan Blum                Perry Carpenter
    Vice President       Managing Vice       Vice President and        Vice President          Vice President and      Director
                         President           Gartner Fellow                                    Distinguished Analyst




    Carsten Casper       Ken Dulaney          Jay Heiser               Ken Dulaney             Joseph Feiman           Peter Firstbrook
    Director, Gartner    Vice President       Vice President           Vice President          Vice President and      Director
    Consulting           and Distinguished                             and Distinguished       Gartner Fellow
                         Analyst                                       Analyst




    Rob McMillan         John P. Morency      Paul E. Proctor          John Girard             Trent Henry             Kelly Kavanagh
    Director             Vice President       Vice President and       Vice President and      Vice President          Principal
                                              Gartner Fellow           Distinguished Analyst                           Research Analyst




    Tom Scholtz          Andrew Walls         Jeffrey Wheatman         Gregg Kriezman          Ramon Krikken           Avivah Litan
    Vice President       Director             Vice President and       Director                Director                Vice President and
    and Distinguished                         Distinguished Analyst                                                    Distinguished Analyst
    Analyst




    Neil MacDonald         Eric Maiwald            Rob McMillan        Mark Nicolett           Lawrence Orans          Eric Ouellet
    Vice President and     Vice President          Director            Vice President and      Director                Vice President
    Gartner Fellow                                                     Distinguished Analyst




    Earl Perkins           John Pescatore          Lawrence Pingree    Doug Simmons            Ray Wagner              Bob Walder
    Vice President         Vice President and      Research Director   Vice President          Managing Vice           Director
                           Distinguished Analyst                       Consulting              President




    Andrew Walls           Alice Wang              Vic Wheatman        Greg Young              Tim Zimmerman
    Director               Director Consulting     Managing Vice       Vice President          Principal Research
                                                   President                                   Analyst



6         Register by April 29 and save $300.
Risk Management                                                           Business Continuity
and Compliance                                                            Management




John Bace                 French Caldwell         Michele Cantara         Ken Dulaney             John Girard
Vice President            Vice President and      Vice President          Vice President and      Vice President and
                          Gartner Fellow                                  Distinguished Analyst   Distinguished Analyst




Carsten Casper            Mark Driver             Ken Dulaney             Jay Heiser              John P. Morency
Research Director         Research Vice           Vice President and      Vice President          Vice President
                          President               Distinguished Analyst




Andrew Frank              John F. Hagerty         Jay Heiser              Tom Scholtz           Donna Scott
Vice President            Vice President and      Vice President          Vice President and    Vice President and
                          Distinguished Analyst                           Distinguished Analyst Distinguished Analyst




Dale Kutnick              Debra Logan             Mark Nicolett           Jeffrey Vining          Andrew Walls
Senior Vice President,    Vice President and      Vice President and      Vice President          Director
Executive Programs        Distinguished Analyst   Distinguished Analyst




Earl Perkins              Paul E. Proctor         Drue Reeves             Roberta J. Witty
Research Vice             Vice President and      Vice President and      Vice President
President                 Gartner Fellow          Distinguished Analyst



                                                                          Gartner	analyst		
                                                                          one-on-ones
                                                                          Sit down privately for 30
Tom Scholtz               Steven Stokes           Andrew Walls            minutes with a Gartner analyst
Vice President and        Managing Vice           Director
Distinguished Analyst     President                                       who specializes in the topic
                                                                          you’d like to discuss. To reserve
                                                                          your one-on-one session,
                                                                          visit the Agenda Builder at
                                                                          gartner.com/us/securityrisk
                                                                          or the one-on-one desk on-site
                                                                          at the conference.


                         Visit gartner.com/us/securityrisk or call 1 866 405 2511.                                        7
Summit Highlights

                                         Networking that delivers valuable insights
                                         In addition to community networking breakfasts by
                                         industry and program, lunch and evening receptions,
                                         hospitality suites and roundtable discussions, this
                                         year’s summit includes a special event presenting
                                         the 2010 executive summary from Financial
                                         Executives International, plus an Executive
                                         Women’s Forum meet-and-greet.
                                         End-user case studies
                                         Gartner invites a number of end users to personally
    CISO and CRO                         present leading-edge case studies and answer
    Invitational Programs                questions. It’s a unique opportunity to hear detailed
    Concurrent with the summit,          accounts of major implementations firsthand.
    CISO and CRO Invitational
                                         Solution provider showcase
    Programs provide a forum for
                                         Meet with today’s leading and most innovative
    the exploration of top-of-mind
    Ieadership, IT security, privacy     solution providers across security and risk. Hear
    and risk management issues           their case studies, get answers to your questions
    for CISOs, CSOs and CROs.            and create a shortlist of top vendors.
    In these intensive programs,
    guest executives meet with
    leading technology providers
    to exchange ideas and
    strategies. Participation            New for 2011
    includes gratis travel, hotel and    Greater breadth and deeper coverage
    registration and is by invitation
                                         of key topics
    only on a first-come, first-served
    basis. To apply, visit               Richer in both breadth and depth, the 2011 summit
    gartner.com/us/securityrisk.         presents more new research than ever before. The
                                         Risk Management and Compliance program and the
                                         IT Security program have each been expanded, with
                                         increased focus on: enterprise and operational risk,
                                         legal and compliance, infrastructure protection and
    Analyst-user	                        secure business enablement. Expect:
    roundtables
                                         • New research, case studies, keynotes and
    Hear how your colleagues               marketplace updates
    from various industries tackle       • More preconference tutorials, workshops and
    problems similar to yours.
    These small group discussions,         networking by community
    moderated by an analyst,             • Eight virtual tracks with in-depth coverage of key
    provide an informal setting for
    you and your peers to share            topics, including wireless, cloud, IAM and privacy
    insight, challenges and              • Four complete programs plus a new track—
    concerns on today’s
    hottest topics.                        Technical Insights: Security Architecture—that
                                           focuses on improving business intelligence and
                                           data management solutions



8        Register by April 29 and save $300.
Program Descriptions

Four complete programs deliver in-depth insight
across key disciplines
IT Security Program
Today’s security is about business as much as technology. From the cloud to the
network, enterprise data to remote computing, security has a direct impact on the
bottom line. In this program, we’ll address evolving trends and challenges across
security, among them:
•   Mobile applications and consumerization
•   Cloud computing and virtualized data centers
•   Advanced persistent threats
•   NEW track: Technical Insights: Security Architecture

Risk Management and Compliance Program
This program focuses on the technologies and strategies to improve governance,
manage risk and adhere to the letter and spirit of the law. Top priorities we’ll
cover include:
•   Answering to the board—risk and compliance in business terms
•   E-discovery and information governance
•   New risks in the IT supply chain
•   Risk-based approaches to privacy

CISO Program
Suited to those new to the role as well as experienced leaders updating their
knowledge base, the program addresses evolving challenges in:
•   Enterprise security intelligence
•   Business-IT security alignment
•   Governance, policy and privacy
•   Corporate risk management

Business Continuity Management Program
How does the enterprise ensure continuing operations and system availability when
something goes wrong? What is the IT disaster recovery plan? These sessions help
organizations anticipate the unanticipated and work to reinforce a discipline of continuity
in the corporate culture, a perspective that can yield added benefits in the form of
business intelligence and greater efficiencies. Key topics include:
• Cloud, mobile and social software, and disaster recovery
• Standards and certification
• Ensuring 24/7 availability




                 Visit gartner.com/us/securityrisk or call 1 866 405 2511.                    9
Virtual Tracks

 Virtual tracks let you follow a key trend or topic with relevant
 sessions pulled from across the conference offerings.
 Through the online Agenda Builder, you can also customize
 any of these eight tracks to suit your own specific interests.
 Visit gartner.com/us/securityrisk on your PC or mobile device
 to get started.

 Wireless and Security                         and budgets from adjacent security,
 Wireless access is a factor in all future     application and risk management
 network and user device approaches,           areas. These sessions address
 bringing both new and reinvented              emerging technologies that have an
 wireless security challenges. This track      impact on privacy, but also those
 covers business-critical system and           that can help to protect personal
 data issues emerging from new wireless        information.
 technologies.
                                               Identity and Access Management
 Cybersecurity                                 As businesses and institutions
 Organized teams of hackers are                mature, they must manage volatile
 coordinating their efforts not only to gain   and rapid change, establish effective
 access to systems for purposes of data        formal governance and provide
 acquisition or sabotage, but to negate        accountability through transparency.
 remediation efforts in an attempt to          IAM can enable these evolutionary
 maintain that access. This track explores     steps, but must itself evolve. It’s
 cybersecurity issues that impact both the     time for your IAM program to grow
 private and public sectors.                   up and display the right foundation,
                                               architecture, governance and
 Cloud Computing
                                               organization for delivering real value;
 Cloud computing presents major security
                                               we’ll examine how.
 challenges as well as exciting new
 opportunities in security-as-a-service and    Trend Watch
 cloud-based security services. In this        The trend line tells us that the
 track, we’ll explore the new imperative:      bad guys are getting smarter, the
 know your risk profile, understand the        technology more evolved and
 risks cloud computing can create,             business practices around security,
 minimize those risks, and move forward        risk and compliance keep moving
 appropriately.                                towards more maturity. Here we
                                               forecast future trends in the domain
 Privacy
                                               to help you get, and keep, ahead of
 Everybody wants privacy, but nobody
                                               the curve.
 wants to pay for it. Privacy professionals
 have to tap into the technology pools




10   Register by April 29 and save $300.
Marketplace Review                                    Thursday
Mergers and acquisitions, new point
                                                      workshop
solutions and the convergence of
product functionality into integrated
                                                      series
solutions all contribute to a dynamic
                                                      Dive into hands-on specifics
security, risk and compliance
                                                      in workshops covering 10
marketplace. What does that mean                      hot topics, from creating
for your investments and future buying                key risk indicators to
decisions? Get the latest updates to help             assessing your organization’s
you anticipate marketplace changes.                   privacy posture.

Social Media                                          AW1. Creating a Balanced
New social media tools aid collaboration,             Scorecard for Information
build brand awareness and facilitate                  Security Jeffrey Wheatman,
                                                      Rob McMillan (8:30 a.m.)
off-the-record communications. These
often bypass corporate filters, meaning               BW1. IAM Program Maturity
that official correspondence is beyond                Assessment Ant Allan,
                                                      Gregg Kreizman, Perry
enterprise control. Meanwhile, corporate
                                                      Carpenter, Earl Perkins,
and personal privacy is increasingly being
                                                      Ray Wagner (8:30 a.m.)
put at risk. What can be done about the
                                                      FW1. BCM Maturity
risks of emerging social media and how do
                                                      John P. Morency,
they balance against the opportunities?
                                                      Roberta J. Witty (8:30 a.m.)
                                                      GW1. Creating Key Risk
                                                      Indicators for Your Company
New track for IT security                             Paul E. Proctor (8:30 a.m.)
                                                      AW2. CRO (10:20 a.m.)
practitioners
                                                      BW2. SEC Foundational
Technical Insights: Security Architecture             Building Blocks of a Data
Providing in-depth technical research and             Loss Prevention Strategy
decision support tools, these sessions explore the    Alice Wang (10:20 a.m.)
architecture and planning considerations for          FW2. KRI Development
protecting information, building secure               John P. Morency,
applications, understanding threats, auditing and     Roberta J. Witty (10:20 a.m.)
monitoring activity, and managing risk associated     For complete details visit
with new devices and service hosting models.          gartner.com/us/securityrisk.
Session topics include:
•   Developing a cloud computing security strategy
•   Consumerization and security architecture
•   Designing security monitoring architectures
•   Application security programs




                 Visit gartner.com/us/securityrisk or call 1 866 405 2511.        11
Monday, June 20                                                                                                                                                                                                                                                                                                                                                                                               Agenda at a Glance
 11:30 a.m. Tutorial 1. Developing Next-Generation Security Metrics               B Tutorial 2. Choosing the Right BCM Consultant for the Job               F   Tutorial 3. Fathoming the Jellyfish: Understanding the Gartner IAM S    Tutorial 4. Security Markets Worldwide    Lawrence Pingree                             B   Tutorial 5. Top Security Trends and Take-Aways for 2011-2012         S      Create your own customized agenda online
            Jeffrey Wheatman                                                      S John P. Morency, Roberta J. Witty                                       B   Taxonomy and Capability Models Ant Allen                           T                                                                                           F   Ray Wagner                                                           T      Don’t miss that must-see session! Use our online
                                                                                  F                                                                         P                                                                       F                                                                                                                                                                   F      Agenda Builder to customize your summit experience
 10:00 a.m. Welcome Address         Vic Wheatman, Managing Vice President and Conference Chair                                                                                                                                                                                                                                                                                                                 prior to the event. Build your agenda on your PC or
 10:15 a.m. Opening Keynote        Michael Chertoff, Secretary of Homeland Security, 2005-2009                                                                                                                                                                                                                                                                                                                 mobile device, sign up for RSS alerts and more at
                                                                                                                                                                                                                                               Enterprise and Operational                       Managing Legal and                                                                                             gartner.com/us/securityrisk.
                                                                                      Secure Business Enablement                                                                                               The CISO
               Infrastructure Protection                                                                                                                                                                                                           Risk Management                               Compliance Risks
                                                                                                                                                                   Technical Insights:
                                                                                 Security
                                                                                                                                                                  Security Architecture
                                                                                                                                                                                                                  CISO                                                       Risk Compliance                                                       BCM                                                         Analyst-User Roundtables
 11:30 a.m. B1. From Security Silos          B C1. Defending the                  T D1. The Identity and Access       B E1. Emerging Technologies           T   TI1. Dangerous Times:           P   A1. Defining the Information    B   G1. Selecting IT Risk Assessment          P   H1. The End of the Beginning and         S   F1. Operations Resilience: How      S   AUR1. Emerging Trends in Security and Risk           AUR2. Tablet Security Supporting iPads in the
            to Enterprise Security           S Homeland: The Future of            S Management Scenario               A for Mobile Security John            A   Shared Intelligence Plays a     A   Security Program                S   Methods and Tools: A Use Case                 What’s Next in Compliance                A   Achievable Will It Be?              B   Management Ray Wagner                                Enterprise Bob Walder
            Intelligence                     A National Cybersecurity             A Gregg Kreizman                    S Girard, Ant Allan                       Vital Role Dan Blum                 F. Christian Byrnes,            F   Approach Tom Scholtz                          John Bace, French Caldwell                   John P. Morency, Donna Scott
            Joseph Feiman                        Andrew Walls                                                                                                                                       Mark A. Margevicius
 12:30 p.m. Attendee Lunch and Solution Showcase Dessert Reception, Theater Showcase Presentations
  2:30 p.m. B2. Adaptive, Context-Aware S C2. Cyberwar and APT: Hype T D2. Improving IAM Processes B E2. Best Practices for                                 T   TI2. Managing the Risk of       S   A2. Risk Assessment 101         F   G2. The KRI Catalog                       B H2. The Future of Privacy Carsten          B   F2. Building Resilience Into the    P   AUR3. Enterprise Security Intelligence               AUR4. Cloud Concerns Roundtable
            Security Infrastructure and A and FUD Bob Walder         S Is a Business Imperative    F Owning Your Airwaves to                                P   Using SaaS Eric Maiwald         A   Jay Heiser                      B   Paul E. Proctor                           P Casper, Andrew Walls, John Bace            S   Development Life Cycle              T   Roundtable Joseph Feiman                             Lawrence Pingree
            Intelligence Neil MacDonald                              A Earl Perkins                S Provide Security, Maximize                             A                                   T                                   S                                             F                                            A   Roberta J. Witty, John P. Morency
                                                                                                     Performance and Mitigate
                                                                                                     Interference Tim Zimmerman
  3:45 p.m. Solution Provider Sessions
  5:00 p.m. Guest Keynote        Fair Game: Intelligence, Integrity, Security and Counterproliferation        Valerie Plame, “Outed” CIA Operative; and Former Ambassador Joseph Wilson
  6:00 p.m. Solution Showcase Evening Reception

 Tuesday, June 21
  7:00 a.m. Breakfast
  8:15 a.m. B3. Content-Aware Data           S C3. Securing the Virtualized       S D3. The Future of Access          T E3. Next-Generation                 P   TI3. Develop a Cloud            S   A3. Report Risk to the          B   G3. Analytics’ Role in Managing Risk      P                                                F3. Standards Comparison:    B          AUR5. Talkin’ Bout My Next                           AUR6. Crisis Management                         P
            Loss Prevention Trends for       A Data Center: From Private          A Management: the End of            A Architectures for Infrastructure    A   Computing Security Strategy     A   Board…and Keep Your Job         P   John F. Hagerty                           A                                                BS 25999, NFPA 1600 and ASIS P          G-g-g-generation Firewall Greg Young                 John P. Morency, Donna Scott                    B
            2011 and Beyond                  T Cloud to Public Cloud                  Point Solutions                 P Guest Access                            Dan Blum                        T   Paul E. Proctor                 F                                                                                              SPC.1-2009 Don Byrnes        F
            Eric Ouellet                         Neil MacDonald                       Gregg Kreizman                      Tim Zimmerman
  9:30 a.m. Solution Provider Sessions
 10:45 a.m. B4. Critical Infrastructure      S C4. How to Use the Cloud           P D4. Security Information          P E4. New Trends in Fraud       P         TI4. Consumerization and            A4. An Introduction to          F   G4. Driving Performance and Improving     P   H4. Understanding the Foundations and    F   F4. Social Software and             A   AUR7. Achieving Your IT Resilience Goals         T AUR8. Network Access Control Experiences
            Protection, Smart Grid and       A and Stay Secure                    A and Event Management              A Detection: Grappling With the A         Security Architecture               Information Security                Risk Management With BPM                  F   Components of Compliance                 P   Recovery Andrew Walls,              B   John P. Morency, Donna Scott                         Lawrence Orans
            Next-Generation Threats              John Pescatore                       Drives Enterprise Security          Enemies Within and Without            Eric Maiwald                        Architecture Tom Scholtz            Michele Cantara                               John Bace                                    Roberta P. Witty
            Earl Perkins                                                              Intelligence Mark Nicolett          Avivah Litan
 11:45 a.m. Solution Showcase Lunch and Exhibits Theater Presentations
  2:00 p.m. B5. iPad Data Safety             P C5. Secure Web Gateways:           P D5. Looking Forward:              B E5. The Enterprise Social           R   One Giant D-L-P for Your            A5. Building an Effective       P   G5. Ensuring Cloud Assurance              S   H5. Intelligent Information Governance   P   F5. Uptime All the Time             A   AUR9. TBA
            Bob Walder                       A Intelligently Defending Against    A Best Practices for User           F Platform: The Newer Attack          S   Security Architecture               Security Awareness Program      F   Jay Heiser                                A   2011 Debra Logan                         F   Donna Scott                         T
                                                 the Web 2.0 Threat Peter             Administration                  S Vector Alice Wang                   A   Trent Henry                         Andrew Walls
                                                 Firstbrook, Lawrence Orans           Perry Carpenter
  3:15 p.m. Solution Provider Sessions
  4:30 p.m. BN1. Net IT Out: Tips for        P CN1. Net IT Out: Cloud             P DN1. Net IT Out: Business             EN1. Net IT Out: Choosing         P                                       AN1. Privacy Policy:            S   GN1. Net IT Out: Operational Technology   S   HN1. Net IT Out: Choosing Enterprise     S   FN1. BCM Software Marketplace P
            Vendor Proposals                 F Performance and Security           A Continuity Management                 User Provisioning Vendors         F                                       Structure and Content           F   Governance, Risk Management and           F   GRC Vendors French Caldwell,             F   Review: Emergency Mass         T
            Greg Young                           Bob Walder                           Planning BCMP Jeff Vining,          Perry Carpenter                                                           Carsten Casper                      Compliance Earl Perkins                       Paul E. Proctor                              Notification Services and BCMP
                                                                                      Roberta J. Witty                                                                                                                                                                                                                             John Girard, Tom Scholtz
                                                                                                                                                                                                                                                                                                                                   DN1. Business Continuity
                                                                                                                                                                                                                                                                                                                                   Management Planning (BCMP)
                                                                                                                                                                                                                                                                                                                                   Jeff Vining, Roberta J. Witty
  4:55 p.m. BN2. Net IT Out: E-Mail          P CN2. Net IT Out: Log               P                                       EN2. Net IT Out: Choosing         P                                       AN2. Managing Relationships P       GN2. Net IT Out: Understanding the        F   HN2. Net IT Out: Choosing IT GRC         P
            Encryption Eric Ouellet          A Management as a Service:           A                                       Fraud Detection Vendors           A                                       With Internal and External  F       E-Discovery Market Debra Logan            S   Management Vendors Mark Nicolett         F
                                                 Alternatives to SIEM                                                     Avivah Litan                                                              Auditors John P. Morency
                                                 Kelly M. Kavanagh
  5:30 p.m. Keynote: TBA
  6:30 p.m. Hospitality Suites

 Wednesday, June 22
  7:30 a.m. Breakfast With the Analysts
  8:30 a.m. B6. Building the Intelligent     S C6. The Mobile Security Brothers D6. One Ring to Rule Them             P E6. The State of Enterprise         T   TI6. IT1 Presentation:              A6. The Care and Feeding of F       G6. Enterprise and Operational Risk       B H6. Supply Chain Risks in a Changing       P   F6. Case Study: A Modern        S       AUR10. Enterprise Fraud Management Roundtable Avivah Litan
            Endpoint Protection Platform     A Traveling Roadshow               All: Intelligent Security             F Data Collaboration for              F   Designing Security                  Security Policies Jay Heiser S      Management: Directors Roundtable,         S World Stephen Stokes                           Approach to Business Resiliency B
            Peter Firstbrook                     John Pescatore, John Girard          Management With Active              Internal and External Needs       S   Monitoring Architectures                                                What the Board Wants Dale Kutnick,                                                         Management at Lockheed
                                                                                      Directory Andrew Walls              With EDRM, DLP, Encryption            Ramon Krikken                                                           French Caldwell                                                                            Martin Corporation
                                                                                                                          and Portals Eric Ouellet                                                                                                                                                                                 Nader Mehravari
  9:45 a.m. Solution Provider Sessions
 11:00 a.m. B7. The Glass House of           P C7. How to Avoid Having a          P D7. Improving IAM. Value          T E7. Case Study: Ensuring                TI7. IT1 Presentation: Making       A7. Articulating the Business   P   G7. Future Scenarios for Privacy,         S   H7. Which Regulations Apply to Me        F   F7. Disaster in the Cloud           A   AUR11. Security Metrics Roundtable                   AUR12. TBA
            Data Center Security             A Really Bad Day: Preparing          A Through Identity and Access       A Privacy—Intelligently Protecting        Progress in Application             Value of Information Security   F   Advertising and Online Social Identity    A   French Caldwell                          P   Jay Heiser                          T   Jeffrey Wheatman
            Greg Young                           For and Managing Security            Intelligence    Earl Perkins    S Patient EMR and Medical                 Security Programs                   Tom Scholtz                         Andrew Frank
                                                 Incidents in a Controlled Way                                            Identity Information                  Ramon Krikken
                                                 Rob McMillan                                                             Saikat Maiti, Head, Information
                                                                                                                          Security and Data Privacy,
                                                                                                                          Varian Medical Systems
 12:00 p.m. Solution Showcase Lunch and Exhibits Theater Presentations
  1:30 p.m. B8. Hey Boss, I Need             P C8. Vulnerability                  S D8. Improving Identity        T E8. Embrace Emerging IAM        A           TI8. Stop Worrying and              A8. What to Do When a           P   G8. Critical Strategies to Manage Risk    S   H8. Negotiating and Managing Cloud       P   F8. Modernizing Recovery Into       A   AUR13. Mobile Applications and Recovery      Roberta J. Witty, John Girard   T
            Another Network Security         A Management for Emerging            A Assurance: Best Practices for F Administration and Intelligence P           Embrace SharePoint Security         Lawyer Is Not Around            F   and Maximize Business Value of Open       F   Legal and Liability Issues               A   Resilience John P. Morency          T
            Tool Lawrence Orans,                 Threats and Technologies           User Authentication           P Trends to Improve Time-to-                  Features Trent Henry                John Bace                           Source Within the Enterprise                  Drue Reeves
            John Pescatore                       Mark Nicolett                        Ant Allan                           Value Perry Carpenter                                                                                         Mark Driver
  2:45 p.m. Solution Provider Sessions
  4:00 p.m. B9. Case Study: Oil Company      S C9. Data Encryption for            P D9. Assessing Risks in Social P E9. Managing Identity in the            T                                       A9. The Future of GRC           S   G9. Case Study: Best Practices in         P   H9. Managing Vendors and Their Risks     P   F9. Case Study: Mobile              P   AUR14. TBA                                           AUR15. TBA
            Builds Security Program Using    A Compliance and Information         F Collaboration Software        A Cloud Greg Kreizman                     F                                       French Caldwell                 A   E-Discovery Debra Logan                   F   to Your Business French Caldwell         F   Technologies in Disaster Recovery   T
            Tools and Governance Doug            Governance     Eric Ouellet          Andrew Walls                                                          P                                                                                                                                                                      John Girard
            Simmons, Gartner Consulting
  5:15 p.m. Guest Keynote Disruptive Tech: What’s New, What’s Coming, How It Will Change Everything and Is It Secure?              David Pogue, Technology Columnist, The New York Times

 Thursday, June 23
  9:00 a.m. GS1. Pocket Power: Reap the Benefits of Mobile Evolution While Managing Risk             Ken Dulaney
 10:20 a.m. GS2. Col. Lindley Johnson, NASA’s Near-Earth Objects Observations Program Executive                                                                  See page 11 for our Thursday Workshop Series or visit gartner.com/us/securityrisk for complete details.                                                             B Business                T Technology           S Strategic            P Practical          A Advanced                F Foundational
 11:45 a.m. Closing Keynote
 12:15 p.m. Conference Ends


12      Register by April 29 and save $300.                                                                                                                                                          Visit gartner.com/us/securityrisk or call 1 866 405 2511.                                                       13
Solution Showcase

Today’s leading solution providers and top innovators in the security, risk
management and business continuity management space will be on-site with their
most informed representatives, ready to answer your questions. Get the research,
ask your questions, streamline the vetting process, and leave with a shortlist you
can act on immediately.
Premier Sponsors                                                                                              as of March 11, 2011
                Cisco security balances protection and power to deliver highly secure collaboration. With Cisco security,
                customers can connect, communicate, and conduct business securely while protecting users, information,
                applications, and the network. Cisco pervasive security can help minimize security and compliance IT risk,
                reduce IT administrative burden, and lower TCO. Information about Cisco security can be found at
                www.cisco.com/go/security
                Google’s cloud computing solutions allow you to dramatically lower IT costs and increase productivity, security
                and reliability. Google Apps is a 100% web suite of applications that includes Gmail, Google Calendar, Google
                Docs and Spreadsheets, Google Sites, and more. Google Postini services help make email systems more
                secure, compliant and reliable by blocking spam and malware before they reach your networks, by providing
                encryption and archiving to help meet compliance requirements, and by offering email continuity.

                Qualys, Inc. <http://www.qualys.com/> is the leading provider of on demand IT security risk and compliance
                management solutions – delivered as a service. Qualys’ Software-as-a-Service solutions are deployed in a
                matter of hours anywhere in the world, providing an immediate, continuous view of security and compliance
                postures. The QualysGuard® service is used today by more than 5,000 organizations in 85 countries, including
                47 of the Fortune Global 100, and performs more than 500 million IP audits per year.

                Symantec is a global leader in providing security, storage and systems management solutions to help our
                customers – from consumers and small businesses to the largest global organizations – secure and manage
                their information-driven world against more risks at more points, more completely and efficiently. Our software
                and services protect completely, in ways that can be easily managed and with controls that can be enforced
                automatically – enabling confidence wherever information is used or stored. www.symantec.com

                Verizon Business, a unit of Verizon Communications, is a global leader in communications solutions. We
                combine professional expertise with one of the world’s most connected IP networks to deliver award-winning
                communications, IT, information security and network solutions. We securely connect today’s enterprises -
                enabling them to increase productivity and efficiency. Many of the world’s largest businesses—including 96% of
                the Fortune 1000—rely on our professional and managed services and network technologies.
                Websense, Inc., a global leader in unified Web security, email security, and data loss prevention (DLP) solutions,
                delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands
                of organizations worldwide. Distributed through global channel partners and delivered as software, appliance and
                Security-as-a-Service (SaaS), Websense helps organizations leverage Web 2.0 and cloud communication, while
                protecting from advanced persistent threats, preventing confidential data loss and enforcing security policies.

Platinum Sponsors
                AT&T Inc. is a global leader in communications, with operating subsidiaries providing services under the AT&T
                brand. AT&T is a recognized leader in Business-related voice and data services, including global IP services,
                hosting, applications, and managed services. In the United States, AT&T is a leader in Mobile voice and data, as
                well as IP, Yellow Pages and advertising services, and provides Wi-Fi service in over 20,000 hotspots.

                CIPHER is a global solution provider in Information Security. It is committed to delivering excellence and innovation
                through Consulting, System Integration and Managed Security Services (MSS) provided by modern 24x7 Security
                Operations Centres (SOC). CIPHER has over 10 years of experience, it is a highly accredited company including
                ISO 20000 and ISO 27001 certification and a pioneer in obtaining PCI-QSA and PCI-ASV certificates.

                Core Security enables organizations to get ahead of threats with security test and measurement solutions that
                continuously identify and prove real-world exposures to their most critical assets. Our customers gain real visibility into
                their security standing, real validation of their security controls, and real metrics for more effective information security.

                Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business
                solutions they trust and value. Recognized as an industry leader by top analysts, Dell SecureWorks provides
                world-class information security services to help organizations of all sizes protect their IT assets, comply with
                regulations and reduce security costs. www.dellsecureworks.com

                As a world-leading information technology company, HP applies new thinking and ideas to create more simple,
                valuable and trusted experiences with technology. Our focus is to continuously improve the way our customers
                live and work through technology products and services, form the individual consumer to the largest enterprise.
                More information can be found at www.hp.com

                Through world-class solutions that address risk across the enterprise, IBM Security Solutions enable
                organizations to build a strong security posture that helps reduce costs, improve service, manage risk,
                and enable innovation. For more information on how to address today’s biggest risks please visit us at
                ibm.com/security.
                Intel is a world leader in computing innovation. The company designs and builds the essential technologies that
                serve as the foundation for the world’s computing devices. Laptops with Intel® Anti-Theft Technology provide
                you with intelligent security for lost or stolen laptops. Because the technology is built into the hardware, Intel
                AT provides local protection that works even if a thief reimages the OS, changes the boot order, installs a new
                hard-drive, or stays off the Internet. Additional information is available at http://anti-theft.intel.com.

                McAfee is the world’s largest dedicated security technology company. McAfee relentlessly tackles the world’s
                toughest security challenges. With nearly 350 patents, our award-winning research team and engineers develop
                solutions that make businesses more powerful to protect their systems, networks, and data, while also helping
                them optimize complex risk and compliance issues. At home, we help consumers secure every aspect of their
                digital life—PC, mobile phone, and internet—with solutions that auto-update and are easy to install and use.
Platinum Sponsors
                                                                   Oracle Corporation (NASDAQ: ORCL) is the world’s largest enterprise software company, providing database,
                                                                   middleware, and collaboration products; enterprise business applications; application development tools; and
                                                                   professional services for businesses and organizations worldwide. For more information, visit oracle.com.

                                                                   Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented
                                                                   visibility and granular policy control of applications and content—by user, not just IP address—at up to 10Gbps
                                                                   with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls
the network security company
                                                              tm
                                                                   accurately identify and control applications—regardless of port, protocol, evasive tactic or SSL encryption—and
                                                                   scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0
                                                                   and maintain complete visibility and control, while significantly reducing total cost of ownership through device
                                                                   consolidation. For more information, visit www.paloaltonetworks.com.

                                                                   RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management
                                                                   solutions for business acceleration. RSA helps the world’s leading organizations succeed by solving their most
                                                                   complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding
                                                                   mobile access and collaboration, proving compliance, and securing virtual and cloud environments.
                                                                   Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss
                                                                   Prevention and Fraud Protection with industry leading eGRC capabilities and robust consulting services, RSA
                                                                   brings visibility and trust to millions of user identities, the transactions that they perform and the data that is
                                                                   generated. For more information, please visit www.RSA.com and www.EMC.com.

                                                                   Solutionary reduces the information security and compliance burden, delivering flexible managed security
                                                                   services that align with client goals, enhancing organizations’ existing security program, infrastructure and
     R E L EVA N T . I N T E L L I G E N T . S EC U R I T Y
                                                                   personnel. The company’s services are based on experienced security professionals, actionable threat
                                                                   intelligence and the ActiveGuard service platform that provide expert security and compliance management.
                                                                   This client focus and dedication to customer service has enabled Solutionary to boast one of the highest client
                                                                   retention rates in the industry.

                                                                   Guided by its vision of Dynamic Security for the Global Network, SonicWALL develops advanced intelligent
                                                                   network security and data protection solutions that adapt as organizations evolve and as threats evolve. Trusted
                                                                   by small and large enterprises worldwide, SonicWALL solutions are designed to detect and control applications
                                                                   and protect networks from intrusions and malware attacks through award-winning hardware, software and
                                                                   virtual appliance-based solutions. For more information, visit http://www.sonicwall.com/.

                                                                   Sourcefire, Inc. (Nasdaq:FIRE) is a world leader in intelligent cybersecurity solutions. Sourcefire is transforming
                                                                   the way Global 2000 organizations and government agencies manage and minimize network security risks.
                                                                   Sourcefire’s Next-Generation IPS™, Next-Generation Firewall™, virtual, and anti-virus/malware solutions equip
                                                                   customers with an efficient and effective layered security defense - protecting network assets before, during
                                                                   and after an attack. Today, the name Sourcefire has grown synonymous with innovation and cybersecurity
                                                                   intelligence. For more information: http://www.sourcefire.com

                                                                   Splunk is software used for monitoring, reporting and analyzing IT data. This data is generated by all
                                                                   applications, systems and infrastructure - located on-premise or in the cloud. IT data is massive in scale,
                                                                   unstructured and contains a definitive record of transactions, systems, applications and user activity. It’s also
                                                                   largely unused, trapped in rigid, silo-based systems. Only Splunk lets you capture and analyze real-time and
                                                                   historical IT data from one place, so you can unlock its value.

                                                                   Trend Micro provides leading Internet content security solutions for businesses and consumers. We protect
                                                                   against malware, spam, data leaks, and the newest Web threats designed to steal digital information. Our
                                                                   unique solutions stop these threats where they first emerge - in the Internet - before they can attack corporate
                                                                   networks and PCs. Founded in 1988, Trend Micro operates globally and protects hundreds of millions of users
                                                                   in the office, at home and on the go.

                                                                   Tripwire is a leading global provider of IT security and compliance automation solutions. Tripwire VIA™, the
                                                                   comprehensive suite of industry-leading file integrity, policy compliance and log and event management
                                                                   solutions, is the way organizations proactively achieve continuous compliance, mitigate risk, and ensure
                                                                   operational control through Visibility, Intelligence and Automation.

                                                                   Trustwave is the leading provider of on-demand and subscription-based information security and payment
                                                                   card industry compliance management solutions to businesses and government entities throughout the world.
                                                                   Trustwave has helped thousands of organizations-ranging from Fortune 500 businesses and large financial
                                                                   institutions to small and medium-sized retailers-manage compliance and secure their network infrastructure,
                                                                   data communications and critical information assets. Trustwave is headquartered in Chicago with offices
                                                                   throughout North America, South America, Europe, Africa, Asia and Australia. For more information, visit
                                                                   https://www.trustwave.com.


  Silver Sponsors
  21st Century Software                                                     Bradford Networks                     Hitachi ID Systems, Inc.               Rapid7
  3M                                                                        BWise                                 Identity Finder, LLC                   RioRey, Inc.
  Absolute Software                                                         Centrify                              InDorse Technologies                   Rsam
  AccessData Group                                                          Clearwell                             LogRhythm, Inc.                        SailPoint
  Agiliance Inc.                                                            COOP Systems                          Lumension                              Smarsh, Inc
  AirWatch                                                                  Cyber-Ark Software                    M86 Security                           SunGard Availability
  AlertEnterprise Inc.                                                      Cyveillance, Inc., A                  MENTIS Software                        Services
  AlgoSec                                                                   QinetiQ North America                 Solutions                              Tenable Network Security,
                                                                            Company                               MetricStream                           Inc.
  ArcSight an HP Company
                                                                            Damballa                              Modulo                                 Tufin Technologies
  AuthenWare Corporation
                                                                            Dataguise, Inc.                       nCircle                                Veracode, Inc.
  Beta Systems Software
                                                                            DeviceLock, Inc.                      nuBridges, Inc.                        Verdasys
  BeyondTrust Software
                                                                            Fischer International                 PricewaterhouseCoopers,
  Bit9, Inc.
                                                                            Identity                              LLP
  Blue Coat Systems, Inc.


14                  Register by April 29 and save $300.
Registration

3 easy ways to register
Web: gartner.com/us/securityrisk
E-mail: us.registration@eventreg.com
Phone: 1 866 405 2511


Don’t miss this year’s in-depth coverage
                                                                        Early-bird
of security and wireless technologies,                                  savings
security and the cloud, and sophisticated
                                                                        Register by
new security threats. There’s no better                                 April 29 and
way to update your IT security insights!                                save $300!

Special Gartner hotel room rate: $230
(plus tax and $15 resort fee) for single or double occupancy

Gaylord National Hotel and Convention Center
201 Waterfront Street
National Harbor, MD 20745
Phone: +1 301 965 4000
A limited block of rooms has been reserved for attendees at this rate until May 23,
2011. To obtain the group rate of $230, indicate that you are attending the Gartner
Security & Risk Management Summit when making your reservation.


Bring the team and save!
Team benefits include:
• Team meeting with a Gartner analyst (end users only)
• Optional team meeting(s) with select executives from vendor organizations
• Advice and support on building personalized agendas
• 10+ free multimedia sessions from Gartner Events on Demand
• Complimentary team lounge and meeting space
• Concierge service, pre-event and on-site
Team discounts on registration rates:
4 for the price of 3                                   For more information, e-mail
7 for the price of 5                                   us.teamsend@eventreg.com or contact
                                                       your Gartner account manager.
12 for the price of 8
Conference registration fee includes conference attendance,
documentation and planned functions.
Standard price: $2,150
Public-sector price: $1,750
Interested in becoming a Gartner client?
Phone: +1 203 316 1111
E-mail: client.info@gartner.com

Sponsorship Opportunities
Silas Mante                         John Forcino                        David Sorkin
Account Manager                     Account Manager                     Sr Account Manager
+1 203 316 3778                     +1 203 316 6142                     +1 203 316 3561
silas.mante@gartner.com             john.forcino@gartner.com            david.sorkin@gartner.com

                   Visit gartner.com/us/securityrisk or call 1 866 405 2511.                       15
56	Top	Gallant	Road
                                                                                                                                                    PO	Box	10212                            Presorted
                                                                                                                                                                                             Standard
                                                                                                                                                    Stamford,	CT	06904-2212
                                                                                                                                                                                           U.S. Postage
                                                                                                                                                                                               PAID
                                                                                                                                                                                              Gartner




                                                                                                                                                    3 easy ways to register
Gartner Security & Risk                                                                                                                             Web: gartner.com/us/securityrisk
Management Summit 2011                                                                                                                              E-mail: us.registration@eventreg.com
June 20 – 23 • National Harbor, MD (Washington, D.C. area)
                                                                                                                                                    Phone: 1 866 405 2511
gartner.com/us/securityrisk

                                                                                                                                                         Priority code:
                Early-bird savings
                Register by April 29 and save $300!

                Nearly 50 security sessions covering privacy, mobility,
                cloud, compliance, IAM, critical infrastructure, business
                enablement and more
                • Mobility, cloud and virtualization
                • Consumerization and compliance
                • Critical infrastructure
                • Business enablement
                • Privacy, IAM and more



                © 2011 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.
                For more information, e-mail info@gartner.com or visit gartner.com. Produced by Marketing Communications

Weitere ähnliche Inhalte

Was ist angesagt?

Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 
Gartner Information Security Summit Brochure
Gartner Information Security Summit BrochureGartner Information Security Summit Brochure
Gartner Information Security Summit Brochuretrunko
 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to SecurityTripwire
 
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...EC-Council
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsPECB
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Dragos, Inc.
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the OpportunityDean Iacovelli
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingTony Martin-Vegue
 
EVOLVE to demand. demand to evolve by Igor Volovich
EVOLVE to demand. demand to evolve by Igor VolovichEVOLVE to demand. demand to evolve by Igor Volovich
EVOLVE to demand. demand to evolve by Igor VolovichEC-Council
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016Anna Fenston
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksPhil Huggins FBCS CITP
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
 

Was ist angesagt? (20)

Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
Gartner Information Security Summit Brochure
Gartner Information Security Summit BrochureGartner Information Security Summit Brochure
Gartner Information Security Summit Brochure
 
Brochure - Jan 14
Brochure - Jan 14Brochure - Jan 14
Brochure - Jan 14
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to Security
 
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisations
 
Intelligence-led Cybersecurity
Intelligence-led Cybersecurity Intelligence-led Cybersecurity
Intelligence-led Cybersecurity
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
 
EVOLVE to demand. demand to evolve by Igor Volovich
EVOLVE to demand. demand to evolve by Igor VolovichEVOLVE to demand. demand to evolve by Igor Volovich
EVOLVE to demand. demand to evolve by Igor Volovich
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 

Ähnlich wie Gartner Security &amp; Risk Management Summit Brochure

Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaDale Butler
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochureAndy Kim
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for SuccessCitrix
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015CSO_Presentations
 

Ähnlich wie Gartner Security &amp; Risk Management Summit Brochure (20)

OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Stu r35 b
Stu r35 bStu r35 b
Stu r35 b
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North America
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
 

Kürzlich hochgeladen

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

Kürzlich hochgeladen (20)

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

Gartner Security &amp; Risk Management Summit Brochure

  • 1. Gartner Security & Risk Management Summit 2011 June 20 – 23 National Harbor, MD (Washington, D.C. area) gartner.com/us/securityrisk Security and Risk Intelligence: The Next Step in Improved Business Performance Intelligence for today’s business-critical security function: • Mobile applications and security • Advanced persistent threats • Cloud computing and security • Consumerization • Securing the virtualized data center Early-bird savings Save $300 when you register by April 29
  • 2. Overview Who should Prepare to benefit from new attend security intelligence capabilities The Gartner Security & Risk Management Summit • CIO, CSO, CISO, CRO, CFO, CCO, CGO, CPO is the premier gathering for senior IT and business and CTOs executives across the breadth of IT security and risk • IT vice presidents/directors management, including privacy, compliance, business continuity management, IT disaster recovery and • Governance, risk, compliance, and privacy executives business resiliency. • Senior business executives Four complete programs—IT Security, Risk Management, Business Continuity Management and • General counsel CISO—deliver: • Finance, audit, legal risk and compliance and regulators • More than 100 drill-down sessions across four • Enterprise and operational programs and eight virtual tracks. risk managers • 15 analyst-led roundtable discussions, 8 workshops, • Continuity of operations keynotes, case studies and more. • Crisis management • Analyst one-on-one meetings. • Disaster recovery • CISO Invitational Program. • IT infrastructure, network • NEW! CRO Invitational Program. and operation This year’s theme explores new business intelligence Hot being generated by next-generation security topics programs—a new source of business value tied directly to the security function. Join us to identify • Mobile applications your next steps toward a more secure and resilient and security enterprise, and improved business performance. • Social media and security • Consumerization • Advanced persistent threats • The future of national cybersecurity • Cloud computing and security • Securing the virtualized data center • Critical infrastructure protection • Fraud detection • Endpoint security • Data loss prevention • Identity management • Information security metrics 22 Register by April 29 and save $300.
  • 3. Benefits of Attending Leverage the global expertise Earn of Gartner analysts CPE credits The Gartner Security and Risk Management Attending the summit helps Summit is unique in the industry. No other gathering you advance your continuing brings together leading executives in IT security and professional education. risk management, Gartner analysts, and relevant Registered participants are solution providers for a comprehensive update on eligible to earn CPE credits security, risk and BCM disciplines. Get the insight toward ISC2, ISACA, and you need to: DRII Certification programs. Learn more at • Architect an overall security, risk management and gartner.com/us/securityrisk. BCM strategy aligned to business needs and goals. • Protect mission-critical infrastructure from sophisticated new threats and deliver a more agile and resilient enterprise. • Benefit from new business intelligence being generated by risk, security and BCM programs. • Evaluate new security risks presented by SaaS, cloud computing and virtualization. • Understand the changing vendor universe and make the right investments. • Keep the board and other business leaders informed by articulating security and risk strategy in business language. • Use insights from BCM, risk and security programs for greater efficiency and improved business performance. • Prepare for new regulatory, compliance, privacy Table of and e-discovery requirements. contents • Use the latest BCM models to identify critical 2 Overview data and processes and make your enterprise 3 Benefits of Attending highly resilient. 4 Keynote Sessions • Create a more risk-aware organizational culture 6 Meet the Analysts that supports risk management initiatives. 8 Summit Highlights 9 Program Descriptions 10 Virtual Tracks 12 Agenda at a Glance 14 Solution Showcase 15 Registration Visit gartner.com/us/securityrisk or call 1 866 405 2511. 3 3
  • 4. Keynote Sessions Gartner keynote Presenter: Vic Wheatman, Managing Vice President, Gartner Research Today’s information security and risk management programs are often based on a noncohesive set of technologies that lacks comprehensive knowledge management, analytics and planning capabilities. What is needed is a transformation to enterprise security intelligence (ESI), enabling correlation and impact analysis across all sources. We have learned how to collect information, but we have not excelled at applying knowledge. In this brief introduction, we will preview the ways in which the conference will bring together the pieces of information security and risk toward an ESI concept to improve organizational performance. Just announced! Guest keynotes Presenter: Valerie Plame, “Outed” CIA operations officer and best-selling author of “Fair Game” As a covert CIA operations officer, Valerie Plame worked to protect America’s national security and prevent the proliferation of weapons of mass destruction. In 2003, she found herself at the heart of a political firestorm when senior White House and State Department officials revealed her secret status to several national journalists—including a syndicated conservative newspaper columnist who published her name. Plame’s autobiography, “Fair Game: My Life as a Spy, My Betrayal by the White House,” became a New York Times bestseller and was recently made into a major motion picture. Presenter: Joseph Wilson, Former U.S. ambassador, author of “The Politics of Truth”; chairman of the board, Symbion Power, Africa Joseph Wilson’s historic career in international relations spans more than three decades, with service under five U.S. presidents: Ford, Carter, Reagan, Bush Sr. and Clinton. Widely recognized for his diplomatic leadership, Wilson was hailed as “a true American hero” by President George H. W. Bush for his efforts to free more than 100 American hostages in Iraq. The last American official to confront Saddam Hussein before the start of the Gulf War, Wilson served as the acting U.S. ambassador in Iraq throughout Operation Desert Shield. 4 Register by April 29 and save $300.
  • 5. Presenter: David Pogue, Tech Program Chairs Columnist, The New York Times As the tech columnist for The New York Times, David Pogue has a front-row seat for observing today’s blazing-fast torrent of new inventions. Hundreds of Vic Wheatman technologies come down the pike every year—and plenty Conference Chair, Managing Vice President get lots of press—but sadly, much of it is junk and some of it carries potential security risks. Pogue will stick his neck out to predict which will actually cause major, disruptive changes. He’ll display, discuss and even demonstrate the technological advances—in personal entertainment, mobile technology, Web 2.0, security and more—that will have the F. Christian Byrnes most impact on society in the coming years. CISO, Managing Vice President Security, Risk and Crisis Management in the Coming Decade Presenter: Michael Chertoff, Former Secretary of Homeland Security, Ray Wagner 2005-2009, Co-Founder and Managing IT Security, Managing Principal, The Chertoff Group Vice President A senior official involved in managing major crises, Michael Chertoff will explore strategies for managing risk. Drawing upon the his experiences as head of the criminal division of the U.S. Department of Justice and as U.S. Secretary of Homeland Security, Mr. Chertoff’s experience spans Lawrence Orans managing responses from the 9/11 attacks, the Enron and IT Security, Director other corporate accounting scandals and natural disasters, including Hurricane Katrina. Mr. Chertoff will address the security challenges posed by foreign investment in sensitive domestic industries and will close with a focus on global vulnerabilities, including supply French Caldwell chain disruption and cyberwarfare. Mr. Chertoff will also Risk Management describe lessons learned regarding preparedness as well and Compliance, Vice President as resiliency and response in exceptionally high-profile media environments. Roberta J. Witty Business Continuity Management, Vice President Visit gartner.com/us/securityrisk or call 1 866 405 2511. 5
  • 6. Meet the Analysts CISO IT Security John Bace F. Christian Byrnes French Caldwell Ant Allan Dan Blum Perry Carpenter Vice President Managing Vice Vice President and Vice President Vice President and Director President Gartner Fellow Distinguished Analyst Carsten Casper Ken Dulaney Jay Heiser Ken Dulaney Joseph Feiman Peter Firstbrook Director, Gartner Vice President Vice President Vice President Vice President and Director Consulting and Distinguished and Distinguished Gartner Fellow Analyst Analyst Rob McMillan John P. Morency Paul E. Proctor John Girard Trent Henry Kelly Kavanagh Director Vice President Vice President and Vice President and Vice President Principal Gartner Fellow Distinguished Analyst Research Analyst Tom Scholtz Andrew Walls Jeffrey Wheatman Gregg Kriezman Ramon Krikken Avivah Litan Vice President Director Vice President and Director Director Vice President and and Distinguished Distinguished Analyst Distinguished Analyst Analyst Neil MacDonald Eric Maiwald Rob McMillan Mark Nicolett Lawrence Orans Eric Ouellet Vice President and Vice President Director Vice President and Director Vice President Gartner Fellow Distinguished Analyst Earl Perkins John Pescatore Lawrence Pingree Doug Simmons Ray Wagner Bob Walder Vice President Vice President and Research Director Vice President Managing Vice Director Distinguished Analyst Consulting President Andrew Walls Alice Wang Vic Wheatman Greg Young Tim Zimmerman Director Director Consulting Managing Vice Vice President Principal Research President Analyst 6 Register by April 29 and save $300.
  • 7. Risk Management Business Continuity and Compliance Management John Bace French Caldwell Michele Cantara Ken Dulaney John Girard Vice President Vice President and Vice President Vice President and Vice President and Gartner Fellow Distinguished Analyst Distinguished Analyst Carsten Casper Mark Driver Ken Dulaney Jay Heiser John P. Morency Research Director Research Vice Vice President and Vice President Vice President President Distinguished Analyst Andrew Frank John F. Hagerty Jay Heiser Tom Scholtz Donna Scott Vice President Vice President and Vice President Vice President and Vice President and Distinguished Analyst Distinguished Analyst Distinguished Analyst Dale Kutnick Debra Logan Mark Nicolett Jeffrey Vining Andrew Walls Senior Vice President, Vice President and Vice President and Vice President Director Executive Programs Distinguished Analyst Distinguished Analyst Earl Perkins Paul E. Proctor Drue Reeves Roberta J. Witty Research Vice Vice President and Vice President and Vice President President Gartner Fellow Distinguished Analyst Gartner analyst one-on-ones Sit down privately for 30 Tom Scholtz Steven Stokes Andrew Walls minutes with a Gartner analyst Vice President and Managing Vice Director Distinguished Analyst President who specializes in the topic you’d like to discuss. To reserve your one-on-one session, visit the Agenda Builder at gartner.com/us/securityrisk or the one-on-one desk on-site at the conference. Visit gartner.com/us/securityrisk or call 1 866 405 2511. 7
  • 8. Summit Highlights Networking that delivers valuable insights In addition to community networking breakfasts by industry and program, lunch and evening receptions, hospitality suites and roundtable discussions, this year’s summit includes a special event presenting the 2010 executive summary from Financial Executives International, plus an Executive Women’s Forum meet-and-greet. End-user case studies Gartner invites a number of end users to personally CISO and CRO present leading-edge case studies and answer Invitational Programs questions. It’s a unique opportunity to hear detailed Concurrent with the summit, accounts of major implementations firsthand. CISO and CRO Invitational Solution provider showcase Programs provide a forum for Meet with today’s leading and most innovative the exploration of top-of-mind Ieadership, IT security, privacy solution providers across security and risk. Hear and risk management issues their case studies, get answers to your questions for CISOs, CSOs and CROs. and create a shortlist of top vendors. In these intensive programs, guest executives meet with leading technology providers to exchange ideas and strategies. Participation New for 2011 includes gratis travel, hotel and Greater breadth and deeper coverage registration and is by invitation of key topics only on a first-come, first-served basis. To apply, visit Richer in both breadth and depth, the 2011 summit gartner.com/us/securityrisk. presents more new research than ever before. The Risk Management and Compliance program and the IT Security program have each been expanded, with increased focus on: enterprise and operational risk, legal and compliance, infrastructure protection and Analyst-user secure business enablement. Expect: roundtables • New research, case studies, keynotes and Hear how your colleagues marketplace updates from various industries tackle • More preconference tutorials, workshops and problems similar to yours. These small group discussions, networking by community moderated by an analyst, • Eight virtual tracks with in-depth coverage of key provide an informal setting for you and your peers to share topics, including wireless, cloud, IAM and privacy insight, challenges and • Four complete programs plus a new track— concerns on today’s hottest topics. Technical Insights: Security Architecture—that focuses on improving business intelligence and data management solutions 8 Register by April 29 and save $300.
  • 9. Program Descriptions Four complete programs deliver in-depth insight across key disciplines IT Security Program Today’s security is about business as much as technology. From the cloud to the network, enterprise data to remote computing, security has a direct impact on the bottom line. In this program, we’ll address evolving trends and challenges across security, among them: • Mobile applications and consumerization • Cloud computing and virtualized data centers • Advanced persistent threats • NEW track: Technical Insights: Security Architecture Risk Management and Compliance Program This program focuses on the technologies and strategies to improve governance, manage risk and adhere to the letter and spirit of the law. Top priorities we’ll cover include: • Answering to the board—risk and compliance in business terms • E-discovery and information governance • New risks in the IT supply chain • Risk-based approaches to privacy CISO Program Suited to those new to the role as well as experienced leaders updating their knowledge base, the program addresses evolving challenges in: • Enterprise security intelligence • Business-IT security alignment • Governance, policy and privacy • Corporate risk management Business Continuity Management Program How does the enterprise ensure continuing operations and system availability when something goes wrong? What is the IT disaster recovery plan? These sessions help organizations anticipate the unanticipated and work to reinforce a discipline of continuity in the corporate culture, a perspective that can yield added benefits in the form of business intelligence and greater efficiencies. Key topics include: • Cloud, mobile and social software, and disaster recovery • Standards and certification • Ensuring 24/7 availability Visit gartner.com/us/securityrisk or call 1 866 405 2511. 9
  • 10. Virtual Tracks Virtual tracks let you follow a key trend or topic with relevant sessions pulled from across the conference offerings. Through the online Agenda Builder, you can also customize any of these eight tracks to suit your own specific interests. Visit gartner.com/us/securityrisk on your PC or mobile device to get started. Wireless and Security and budgets from adjacent security, Wireless access is a factor in all future application and risk management network and user device approaches, areas. These sessions address bringing both new and reinvented emerging technologies that have an wireless security challenges. This track impact on privacy, but also those covers business-critical system and that can help to protect personal data issues emerging from new wireless information. technologies. Identity and Access Management Cybersecurity As businesses and institutions Organized teams of hackers are mature, they must manage volatile coordinating their efforts not only to gain and rapid change, establish effective access to systems for purposes of data formal governance and provide acquisition or sabotage, but to negate accountability through transparency. remediation efforts in an attempt to IAM can enable these evolutionary maintain that access. This track explores steps, but must itself evolve. It’s cybersecurity issues that impact both the time for your IAM program to grow private and public sectors. up and display the right foundation, architecture, governance and Cloud Computing organization for delivering real value; Cloud computing presents major security we’ll examine how. challenges as well as exciting new opportunities in security-as-a-service and Trend Watch cloud-based security services. In this The trend line tells us that the track, we’ll explore the new imperative: bad guys are getting smarter, the know your risk profile, understand the technology more evolved and risks cloud computing can create, business practices around security, minimize those risks, and move forward risk and compliance keep moving appropriately. towards more maturity. Here we forecast future trends in the domain Privacy to help you get, and keep, ahead of Everybody wants privacy, but nobody the curve. wants to pay for it. Privacy professionals have to tap into the technology pools 10 Register by April 29 and save $300.
  • 11. Marketplace Review Thursday Mergers and acquisitions, new point workshop solutions and the convergence of product functionality into integrated series solutions all contribute to a dynamic Dive into hands-on specifics security, risk and compliance in workshops covering 10 marketplace. What does that mean hot topics, from creating for your investments and future buying key risk indicators to decisions? Get the latest updates to help assessing your organization’s you anticipate marketplace changes. privacy posture. Social Media AW1. Creating a Balanced New social media tools aid collaboration, Scorecard for Information build brand awareness and facilitate Security Jeffrey Wheatman, Rob McMillan (8:30 a.m.) off-the-record communications. These often bypass corporate filters, meaning BW1. IAM Program Maturity that official correspondence is beyond Assessment Ant Allan, Gregg Kreizman, Perry enterprise control. Meanwhile, corporate Carpenter, Earl Perkins, and personal privacy is increasingly being Ray Wagner (8:30 a.m.) put at risk. What can be done about the FW1. BCM Maturity risks of emerging social media and how do John P. Morency, they balance against the opportunities? Roberta J. Witty (8:30 a.m.) GW1. Creating Key Risk Indicators for Your Company New track for IT security Paul E. Proctor (8:30 a.m.) AW2. CRO (10:20 a.m.) practitioners BW2. SEC Foundational Technical Insights: Security Architecture Building Blocks of a Data Providing in-depth technical research and Loss Prevention Strategy decision support tools, these sessions explore the Alice Wang (10:20 a.m.) architecture and planning considerations for FW2. KRI Development protecting information, building secure John P. Morency, applications, understanding threats, auditing and Roberta J. Witty (10:20 a.m.) monitoring activity, and managing risk associated For complete details visit with new devices and service hosting models. gartner.com/us/securityrisk. Session topics include: • Developing a cloud computing security strategy • Consumerization and security architecture • Designing security monitoring architectures • Application security programs Visit gartner.com/us/securityrisk or call 1 866 405 2511. 11
  • 12. Monday, June 20 Agenda at a Glance 11:30 a.m. Tutorial 1. Developing Next-Generation Security Metrics B Tutorial 2. Choosing the Right BCM Consultant for the Job F Tutorial 3. Fathoming the Jellyfish: Understanding the Gartner IAM S Tutorial 4. Security Markets Worldwide Lawrence Pingree B Tutorial 5. Top Security Trends and Take-Aways for 2011-2012 S Create your own customized agenda online Jeffrey Wheatman S John P. Morency, Roberta J. Witty B Taxonomy and Capability Models Ant Allen T F Ray Wagner T Don’t miss that must-see session! Use our online F P F F Agenda Builder to customize your summit experience 10:00 a.m. Welcome Address Vic Wheatman, Managing Vice President and Conference Chair prior to the event. Build your agenda on your PC or 10:15 a.m. Opening Keynote Michael Chertoff, Secretary of Homeland Security, 2005-2009 mobile device, sign up for RSS alerts and more at Enterprise and Operational Managing Legal and gartner.com/us/securityrisk. Secure Business Enablement The CISO Infrastructure Protection Risk Management Compliance Risks Technical Insights: Security Security Architecture CISO Risk Compliance BCM Analyst-User Roundtables 11:30 a.m. B1. From Security Silos B C1. Defending the T D1. The Identity and Access B E1. Emerging Technologies T TI1. Dangerous Times: P A1. Defining the Information B G1. Selecting IT Risk Assessment P H1. The End of the Beginning and S F1. Operations Resilience: How S AUR1. Emerging Trends in Security and Risk AUR2. Tablet Security Supporting iPads in the to Enterprise Security S Homeland: The Future of S Management Scenario A for Mobile Security John A Shared Intelligence Plays a A Security Program S Methods and Tools: A Use Case What’s Next in Compliance A Achievable Will It Be? B Management Ray Wagner Enterprise Bob Walder Intelligence A National Cybersecurity A Gregg Kreizman S Girard, Ant Allan Vital Role Dan Blum F. Christian Byrnes, F Approach Tom Scholtz John Bace, French Caldwell John P. Morency, Donna Scott Joseph Feiman Andrew Walls Mark A. Margevicius 12:30 p.m. Attendee Lunch and Solution Showcase Dessert Reception, Theater Showcase Presentations 2:30 p.m. B2. Adaptive, Context-Aware S C2. Cyberwar and APT: Hype T D2. Improving IAM Processes B E2. Best Practices for T TI2. Managing the Risk of S A2. Risk Assessment 101 F G2. The KRI Catalog B H2. The Future of Privacy Carsten B F2. Building Resilience Into the P AUR3. Enterprise Security Intelligence AUR4. Cloud Concerns Roundtable Security Infrastructure and A and FUD Bob Walder S Is a Business Imperative F Owning Your Airwaves to P Using SaaS Eric Maiwald A Jay Heiser B Paul E. Proctor P Casper, Andrew Walls, John Bace S Development Life Cycle T Roundtable Joseph Feiman Lawrence Pingree Intelligence Neil MacDonald A Earl Perkins S Provide Security, Maximize A T S F A Roberta J. Witty, John P. Morency Performance and Mitigate Interference Tim Zimmerman 3:45 p.m. Solution Provider Sessions 5:00 p.m. Guest Keynote Fair Game: Intelligence, Integrity, Security and Counterproliferation Valerie Plame, “Outed” CIA Operative; and Former Ambassador Joseph Wilson 6:00 p.m. Solution Showcase Evening Reception Tuesday, June 21 7:00 a.m. Breakfast 8:15 a.m. B3. Content-Aware Data S C3. Securing the Virtualized S D3. The Future of Access T E3. Next-Generation P TI3. Develop a Cloud S A3. Report Risk to the B G3. Analytics’ Role in Managing Risk P F3. Standards Comparison: B AUR5. Talkin’ Bout My Next AUR6. Crisis Management P Loss Prevention Trends for A Data Center: From Private A Management: the End of A Architectures for Infrastructure A Computing Security Strategy A Board…and Keep Your Job P John F. Hagerty A BS 25999, NFPA 1600 and ASIS P G-g-g-generation Firewall Greg Young John P. Morency, Donna Scott B 2011 and Beyond T Cloud to Public Cloud Point Solutions P Guest Access Dan Blum T Paul E. Proctor F SPC.1-2009 Don Byrnes F Eric Ouellet Neil MacDonald Gregg Kreizman Tim Zimmerman 9:30 a.m. Solution Provider Sessions 10:45 a.m. B4. Critical Infrastructure S C4. How to Use the Cloud P D4. Security Information P E4. New Trends in Fraud P TI4. Consumerization and A4. An Introduction to F G4. Driving Performance and Improving P H4. Understanding the Foundations and F F4. Social Software and A AUR7. Achieving Your IT Resilience Goals T AUR8. Network Access Control Experiences Protection, Smart Grid and A and Stay Secure A and Event Management A Detection: Grappling With the A Security Architecture Information Security Risk Management With BPM F Components of Compliance P Recovery Andrew Walls, B John P. Morency, Donna Scott Lawrence Orans Next-Generation Threats John Pescatore Drives Enterprise Security Enemies Within and Without Eric Maiwald Architecture Tom Scholtz Michele Cantara John Bace Roberta P. Witty Earl Perkins Intelligence Mark Nicolett Avivah Litan 11:45 a.m. Solution Showcase Lunch and Exhibits Theater Presentations 2:00 p.m. B5. iPad Data Safety P C5. Secure Web Gateways: P D5. Looking Forward: B E5. The Enterprise Social R One Giant D-L-P for Your A5. Building an Effective P G5. Ensuring Cloud Assurance S H5. Intelligent Information Governance P F5. Uptime All the Time A AUR9. TBA Bob Walder A Intelligently Defending Against A Best Practices for User F Platform: The Newer Attack S Security Architecture Security Awareness Program F Jay Heiser A 2011 Debra Logan F Donna Scott T the Web 2.0 Threat Peter Administration S Vector Alice Wang A Trent Henry Andrew Walls Firstbrook, Lawrence Orans Perry Carpenter 3:15 p.m. Solution Provider Sessions 4:30 p.m. BN1. Net IT Out: Tips for P CN1. Net IT Out: Cloud P DN1. Net IT Out: Business EN1. Net IT Out: Choosing P AN1. Privacy Policy: S GN1. Net IT Out: Operational Technology S HN1. Net IT Out: Choosing Enterprise S FN1. BCM Software Marketplace P Vendor Proposals F Performance and Security A Continuity Management User Provisioning Vendors F Structure and Content F Governance, Risk Management and F GRC Vendors French Caldwell, F Review: Emergency Mass T Greg Young Bob Walder Planning BCMP Jeff Vining, Perry Carpenter Carsten Casper Compliance Earl Perkins Paul E. Proctor Notification Services and BCMP Roberta J. Witty John Girard, Tom Scholtz DN1. Business Continuity Management Planning (BCMP) Jeff Vining, Roberta J. Witty 4:55 p.m. BN2. Net IT Out: E-Mail P CN2. Net IT Out: Log P EN2. Net IT Out: Choosing P AN2. Managing Relationships P GN2. Net IT Out: Understanding the F HN2. Net IT Out: Choosing IT GRC P Encryption Eric Ouellet A Management as a Service: A Fraud Detection Vendors A With Internal and External F E-Discovery Market Debra Logan S Management Vendors Mark Nicolett F Alternatives to SIEM Avivah Litan Auditors John P. Morency Kelly M. Kavanagh 5:30 p.m. Keynote: TBA 6:30 p.m. Hospitality Suites Wednesday, June 22 7:30 a.m. Breakfast With the Analysts 8:30 a.m. B6. Building the Intelligent S C6. The Mobile Security Brothers D6. One Ring to Rule Them P E6. The State of Enterprise T TI6. IT1 Presentation: A6. The Care and Feeding of F G6. Enterprise and Operational Risk B H6. Supply Chain Risks in a Changing P F6. Case Study: A Modern S AUR10. Enterprise Fraud Management Roundtable Avivah Litan Endpoint Protection Platform A Traveling Roadshow All: Intelligent Security F Data Collaboration for F Designing Security Security Policies Jay Heiser S Management: Directors Roundtable, S World Stephen Stokes Approach to Business Resiliency B Peter Firstbrook John Pescatore, John Girard Management With Active Internal and External Needs S Monitoring Architectures What the Board Wants Dale Kutnick, Management at Lockheed Directory Andrew Walls With EDRM, DLP, Encryption Ramon Krikken French Caldwell Martin Corporation and Portals Eric Ouellet Nader Mehravari 9:45 a.m. Solution Provider Sessions 11:00 a.m. B7. The Glass House of P C7. How to Avoid Having a P D7. Improving IAM. Value T E7. Case Study: Ensuring TI7. IT1 Presentation: Making A7. Articulating the Business P G7. Future Scenarios for Privacy, S H7. Which Regulations Apply to Me F F7. Disaster in the Cloud A AUR11. Security Metrics Roundtable AUR12. TBA Data Center Security A Really Bad Day: Preparing A Through Identity and Access A Privacy—Intelligently Protecting Progress in Application Value of Information Security F Advertising and Online Social Identity A French Caldwell P Jay Heiser T Jeffrey Wheatman Greg Young For and Managing Security Intelligence Earl Perkins S Patient EMR and Medical Security Programs Tom Scholtz Andrew Frank Incidents in a Controlled Way Identity Information Ramon Krikken Rob McMillan Saikat Maiti, Head, Information Security and Data Privacy, Varian Medical Systems 12:00 p.m. Solution Showcase Lunch and Exhibits Theater Presentations 1:30 p.m. B8. Hey Boss, I Need P C8. Vulnerability S D8. Improving Identity T E8. Embrace Emerging IAM A TI8. Stop Worrying and A8. What to Do When a P G8. Critical Strategies to Manage Risk S H8. Negotiating and Managing Cloud P F8. Modernizing Recovery Into A AUR13. Mobile Applications and Recovery Roberta J. Witty, John Girard T Another Network Security A Management for Emerging A Assurance: Best Practices for F Administration and Intelligence P Embrace SharePoint Security Lawyer Is Not Around F and Maximize Business Value of Open F Legal and Liability Issues A Resilience John P. Morency T Tool Lawrence Orans, Threats and Technologies User Authentication P Trends to Improve Time-to- Features Trent Henry John Bace Source Within the Enterprise Drue Reeves John Pescatore Mark Nicolett Ant Allan Value Perry Carpenter Mark Driver 2:45 p.m. Solution Provider Sessions 4:00 p.m. B9. Case Study: Oil Company S C9. Data Encryption for P D9. Assessing Risks in Social P E9. Managing Identity in the T A9. The Future of GRC S G9. Case Study: Best Practices in P H9. Managing Vendors and Their Risks P F9. Case Study: Mobile P AUR14. TBA AUR15. TBA Builds Security Program Using A Compliance and Information F Collaboration Software A Cloud Greg Kreizman F French Caldwell A E-Discovery Debra Logan F to Your Business French Caldwell F Technologies in Disaster Recovery T Tools and Governance Doug Governance Eric Ouellet Andrew Walls P John Girard Simmons, Gartner Consulting 5:15 p.m. Guest Keynote Disruptive Tech: What’s New, What’s Coming, How It Will Change Everything and Is It Secure? David Pogue, Technology Columnist, The New York Times Thursday, June 23 9:00 a.m. GS1. Pocket Power: Reap the Benefits of Mobile Evolution While Managing Risk Ken Dulaney 10:20 a.m. GS2. Col. Lindley Johnson, NASA’s Near-Earth Objects Observations Program Executive See page 11 for our Thursday Workshop Series or visit gartner.com/us/securityrisk for complete details. B Business T Technology S Strategic P Practical A Advanced F Foundational 11:45 a.m. Closing Keynote 12:15 p.m. Conference Ends 12 Register by April 29 and save $300. Visit gartner.com/us/securityrisk or call 1 866 405 2511. 13
  • 13. Solution Showcase Today’s leading solution providers and top innovators in the security, risk management and business continuity management space will be on-site with their most informed representatives, ready to answer your questions. Get the research, ask your questions, streamline the vetting process, and leave with a shortlist you can act on immediately. Premier Sponsors as of March 11, 2011 Cisco security balances protection and power to deliver highly secure collaboration. With Cisco security, customers can connect, communicate, and conduct business securely while protecting users, information, applications, and the network. Cisco pervasive security can help minimize security and compliance IT risk, reduce IT administrative burden, and lower TCO. Information about Cisco security can be found at www.cisco.com/go/security Google’s cloud computing solutions allow you to dramatically lower IT costs and increase productivity, security and reliability. Google Apps is a 100% web suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and more. Google Postini services help make email systems more secure, compliant and reliable by blocking spam and malware before they reach your networks, by providing encryption and archiving to help meet compliance requirements, and by offering email continuity. Qualys, Inc. <http://www.qualys.com/> is the leading provider of on demand IT security risk and compliance management solutions – delivered as a service. Qualys’ Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing an immediate, continuous view of security and compliance postures. The QualysGuard® service is used today by more than 5,000 organizations in 85 countries, including 47 of the Fortune Global 100, and performs more than 500 million IP audits per year. Symantec is a global leader in providing security, storage and systems management solutions to help our customers – from consumers and small businesses to the largest global organizations – secure and manage their information-driven world against more risks at more points, more completely and efficiently. Our software and services protect completely, in ways that can be easily managed and with controls that can be enforced automatically – enabling confidence wherever information is used or stored. www.symantec.com Verizon Business, a unit of Verizon Communications, is a global leader in communications solutions. We combine professional expertise with one of the world’s most connected IP networks to deliver award-winning communications, IT, information security and network solutions. We securely connect today’s enterprises - enabling them to increase productivity and efficiency. Many of the world’s largest businesses—including 96% of the Fortune 1000—rely on our professional and managed services and network technologies. Websense, Inc., a global leader in unified Web security, email security, and data loss prevention (DLP) solutions, delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of organizations worldwide. Distributed through global channel partners and delivered as software, appliance and Security-as-a-Service (SaaS), Websense helps organizations leverage Web 2.0 and cloud communication, while protecting from advanced persistent threats, preventing confidential data loss and enforcing security policies. Platinum Sponsors AT&T Inc. is a global leader in communications, with operating subsidiaries providing services under the AT&T brand. AT&T is a recognized leader in Business-related voice and data services, including global IP services, hosting, applications, and managed services. In the United States, AT&T is a leader in Mobile voice and data, as well as IP, Yellow Pages and advertising services, and provides Wi-Fi service in over 20,000 hotspots. CIPHER is a global solution provider in Information Security. It is committed to delivering excellence and innovation through Consulting, System Integration and Managed Security Services (MSS) provided by modern 24x7 Security Operations Centres (SOC). CIPHER has over 10 years of experience, it is a highly accredited company including ISO 20000 and ISO 27001 certification and a pioneer in obtaining PCI-QSA and PCI-ASV certificates. Core Security enables organizations to get ahead of threats with security test and measurement solutions that continuously identify and prove real-world exposures to their most critical assets. Our customers gain real visibility into their security standing, real validation of their security controls, and real metrics for more effective information security. Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Recognized as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs. www.dellsecureworks.com As a world-leading information technology company, HP applies new thinking and ideas to create more simple, valuable and trusted experiences with technology. Our focus is to continuously improve the way our customers live and work through technology products and services, form the individual consumer to the largest enterprise. More information can be found at www.hp.com Through world-class solutions that address risk across the enterprise, IBM Security Solutions enable organizations to build a strong security posture that helps reduce costs, improve service, manage risk, and enable innovation. For more information on how to address today’s biggest risks please visit us at ibm.com/security. Intel is a world leader in computing innovation. The company designs and builds the essential technologies that serve as the foundation for the world’s computing devices. Laptops with Intel® Anti-Theft Technology provide you with intelligent security for lost or stolen laptops. Because the technology is built into the hardware, Intel AT provides local protection that works even if a thief reimages the OS, changes the boot order, installs a new hard-drive, or stays off the Internet. Additional information is available at http://anti-theft.intel.com. McAfee is the world’s largest dedicated security technology company. McAfee relentlessly tackles the world’s toughest security challenges. With nearly 350 patents, our award-winning research team and engineers develop solutions that make businesses more powerful to protect their systems, networks, and data, while also helping them optimize complex risk and compliance issues. At home, we help consumers secure every aspect of their digital life—PC, mobile phone, and internet—with solutions that auto-update and are easy to install and use.
  • 14. Platinum Sponsors Oracle Corporation (NASDAQ: ORCL) is the world’s largest enterprise software company, providing database, middleware, and collaboration products; enterprise business applications; application development tools; and professional services for businesses and organizations worldwide. For more information, visit oracle.com. Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content—by user, not just IP address—at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls the network security company tm accurately identify and control applications—regardless of port, protocol, evasive tactic or SSL encryption—and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, visit www.paloaltonetworks.com. RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world’s leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention and Fraud Protection with industry leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com. Solutionary reduces the information security and compliance burden, delivering flexible managed security services that align with client goals, enhancing organizations’ existing security program, infrastructure and R E L EVA N T . I N T E L L I G E N T . S EC U R I T Y personnel. The company’s services are based on experienced security professionals, actionable threat intelligence and the ActiveGuard service platform that provide expert security and compliance management. This client focus and dedication to customer service has enabled Solutionary to boast one of the highest client retention rates in the industry. Guided by its vision of Dynamic Security for the Global Network, SonicWALL develops advanced intelligent network security and data protection solutions that adapt as organizations evolve and as threats evolve. Trusted by small and large enterprises worldwide, SonicWALL solutions are designed to detect and control applications and protect networks from intrusions and malware attacks through award-winning hardware, software and virtual appliance-based solutions. For more information, visit http://www.sonicwall.com/. Sourcefire, Inc. (Nasdaq:FIRE) is a world leader in intelligent cybersecurity solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks. Sourcefire’s Next-Generation IPS™, Next-Generation Firewall™, virtual, and anti-virus/malware solutions equip customers with an efficient and effective layered security defense - protecting network assets before, during and after an attack. Today, the name Sourcefire has grown synonymous with innovation and cybersecurity intelligence. For more information: http://www.sourcefire.com Splunk is software used for monitoring, reporting and analyzing IT data. This data is generated by all applications, systems and infrastructure - located on-premise or in the cloud. IT data is massive in scale, unstructured and contains a definitive record of transactions, systems, applications and user activity. It’s also largely unused, trapped in rigid, silo-based systems. Only Splunk lets you capture and analyze real-time and historical IT data from one place, so you can unlock its value. Trend Micro provides leading Internet content security solutions for businesses and consumers. We protect against malware, spam, data leaks, and the newest Web threats designed to steal digital information. Our unique solutions stop these threats where they first emerge - in the Internet - before they can attack corporate networks and PCs. Founded in 1988, Trend Micro operates globally and protects hundreds of millions of users in the office, at home and on the go. Tripwire is a leading global provider of IT security and compliance automation solutions. Tripwire VIA™, the comprehensive suite of industry-leading file integrity, policy compliance and log and event management solutions, is the way organizations proactively achieve continuous compliance, mitigate risk, and ensure operational control through Visibility, Intelligence and Automation. Trustwave is the leading provider of on-demand and subscription-based information security and payment card industry compliance management solutions to businesses and government entities throughout the world. Trustwave has helped thousands of organizations-ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers-manage compliance and secure their network infrastructure, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia. For more information, visit https://www.trustwave.com. Silver Sponsors 21st Century Software Bradford Networks Hitachi ID Systems, Inc. Rapid7 3M BWise Identity Finder, LLC RioRey, Inc. Absolute Software Centrify InDorse Technologies Rsam AccessData Group Clearwell LogRhythm, Inc. SailPoint Agiliance Inc. COOP Systems Lumension Smarsh, Inc AirWatch Cyber-Ark Software M86 Security SunGard Availability AlertEnterprise Inc. Cyveillance, Inc., A MENTIS Software Services AlgoSec QinetiQ North America Solutions Tenable Network Security, Company MetricStream Inc. ArcSight an HP Company Damballa Modulo Tufin Technologies AuthenWare Corporation Dataguise, Inc. nCircle Veracode, Inc. Beta Systems Software DeviceLock, Inc. nuBridges, Inc. Verdasys BeyondTrust Software Fischer International PricewaterhouseCoopers, Bit9, Inc. Identity LLP Blue Coat Systems, Inc. 14 Register by April 29 and save $300.
  • 15. Registration 3 easy ways to register Web: gartner.com/us/securityrisk E-mail: us.registration@eventreg.com Phone: 1 866 405 2511 Don’t miss this year’s in-depth coverage Early-bird of security and wireless technologies, savings security and the cloud, and sophisticated Register by new security threats. There’s no better April 29 and way to update your IT security insights! save $300! Special Gartner hotel room rate: $230 (plus tax and $15 resort fee) for single or double occupancy Gaylord National Hotel and Convention Center 201 Waterfront Street National Harbor, MD 20745 Phone: +1 301 965 4000 A limited block of rooms has been reserved for attendees at this rate until May 23, 2011. To obtain the group rate of $230, indicate that you are attending the Gartner Security & Risk Management Summit when making your reservation. Bring the team and save! Team benefits include: • Team meeting with a Gartner analyst (end users only) • Optional team meeting(s) with select executives from vendor organizations • Advice and support on building personalized agendas • 10+ free multimedia sessions from Gartner Events on Demand • Complimentary team lounge and meeting space • Concierge service, pre-event and on-site Team discounts on registration rates: 4 for the price of 3 For more information, e-mail 7 for the price of 5 us.teamsend@eventreg.com or contact your Gartner account manager. 12 for the price of 8 Conference registration fee includes conference attendance, documentation and planned functions. Standard price: $2,150 Public-sector price: $1,750 Interested in becoming a Gartner client? Phone: +1 203 316 1111 E-mail: client.info@gartner.com Sponsorship Opportunities Silas Mante John Forcino David Sorkin Account Manager Account Manager Sr Account Manager +1 203 316 3778 +1 203 316 6142 +1 203 316 3561 silas.mante@gartner.com john.forcino@gartner.com david.sorkin@gartner.com Visit gartner.com/us/securityrisk or call 1 866 405 2511. 15
  • 16. 56 Top Gallant Road PO Box 10212 Presorted Standard Stamford, CT 06904-2212 U.S. Postage PAID Gartner 3 easy ways to register Gartner Security & Risk Web: gartner.com/us/securityrisk Management Summit 2011 E-mail: us.registration@eventreg.com June 20 – 23 • National Harbor, MD (Washington, D.C. area) Phone: 1 866 405 2511 gartner.com/us/securityrisk Priority code: Early-bird savings Register by April 29 and save $300! Nearly 50 security sessions covering privacy, mobility, cloud, compliance, IAM, critical infrastructure, business enablement and more • Mobility, cloud and virtualization • Consumerization and compliance • Critical infrastructure • Business enablement • Privacy, IAM and more © 2011 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Produced by Marketing Communications